[an error occurred while processing this directive]
[an error occurred while processing this directive]This unit aims to provide students with an advanced knowledge of network security. Topics to be covered include the design and implementation of some important public key systems: RSA and Elliptic Curve algorithms; concepts of quantum cryptography; quantum computing and cryptography; wireless computing and cryptography; design, implementation and configuration of firewalls in depth; design, implementation and configuration of intrusion detection systems; prevention systems; advanced network security architectures; advanced wireless security: principle and practice; security in trusted-based computing environments; and quantum cryptography.
2 hrs lectures/wk, 2 hrs laboratories/wk
Workload commitments per week are:
Two-hour lecture, two-hour tutorial (or laboratory) requiring preparation in advance, and a minimum of two-hours of personal study per one-hour of contact time in order to satisfy the reading and assignment expectations.
CPE5021
Phu Dung Le
Consultation hours: Wednesday 8pm - 10pm
Assignments: 40%; Lab exercises and group assignments: 30%; Theoretical test: 30%
Assessment Task | Value | Due Date |
---|---|---|
Group Assignment | 20% | Week 8, Friday 4pm |
Individual Assignment | 40% | Week 14, Friday 4pm |
Lab Exercises | 10% | Weekly (Week 2 to Week 10) |
Theoretical test | 30% | Week 12 lecture |
Monash is committed to excellence in education and regularly seeks feedback from students, employers and staff. One of the key formal ways students have to provide feedback is through SETU, Student Evaluation of Teacher and Unit. The University's student evaluation policy requires that every unit is evaluated each year. Students are strongly encouraged to complete the surveys. The feedback is anonymous and provides the Faculty with evidence of aspects that students are satisfied and areas for improvement.
For more information on Monash's educational strategy, and on student evaluations, see:
http://www.monash.edu.au/about/monash-directions/directions.html
http://www.policy.monash.edu/policy-bank/academic/education/quality/student-evaluation-policy.html
Feedback from past students clearly has highlighted the following strengths and necessary improvements:
If you wish to view how previous students rated this unit, please go to
https://emuapps.monash.edu.au/unitevaluations/index.jsp
Please check with your lecturer before purchasing any Required Resources. Limited copies of prescribed texts are available for you to borrow in the library, and prescribed software is available in student labs.
Removable hard drives and Scientific Linux software will be provided at the labs.
Week | Activities | Assessment |
---|---|---|
0 | No formal assessment or activities are undertaken in week 0 | |
1 | Modern computing and network security | |
2 | Modern Crypto Systems | Weekly Lab Exercises (Week 2 to Week 10) commence |
3 | ECC design and implementation | |
4 | Introduction to intrusion detection systems | |
5 | Security of wireless networks and applications | |
6 | Advanced wireless network security | |
7 | Networked and distributed software security | |
8 | Networked and distributed software security (continued) | Group Assignment due Week 8, Friday 4pm |
9 | Computer system security and performance | |
10 | Security of large computer systems including virtual networks and cloud computing systems | |
11 | Advanced theories and network security approaches (if there is still time) | |
12 | Theoretical test in lecture | Theoretical test in lecture Week 12 |
SWOT VAC | No formal assessment is undertaken in SWOT VAC; Individual Assignment due Week 14, Friday 4pm | |
Examination period | LINK to Assessment Policy: http://policy.monash.edu.au/policy-bank/ academic/education/assessment/ assessment-in-coursework-policy.html |
*Unit Schedule details will be maintained and communicated to you via your MUSO (Blackboard or Moodle) learning system.
Faculty Policy - Unit Assessment Hurdles (http://www.infotech.monash.edu.au/resources/staff/edgov/policies/assessment-examinations/unit-assessment-hurdles.html)
Academic Integrity - Please see the Demystifying Citing and Referencing tutorial at http://lib.monash.edu/tutorials/citing/
Option 1 - You have to demonstrate your understanding of the algorithms used in your implementation. A good security analysis of your implementation will give you 30% of the total mark. If your code works and reflects the theory of ECC, this will give you another 30%. Your correct demonstration and answers to interview questions will give you the final 40% of the mark.
Option 2 - Your complete security configuration will get you 40% of the total mark. Good security tests of all your security services and a report with your test plans, limitations and possible attacks beyond your defence system will be worth 60% of the total mark.
If you install and configure all the required system security services correctly you will be given 20% of the total mark. Providing correctly written test plans will give you another 40%. Your demonstration of your tests and answers to interview questions will be worth 40% of the total mark.
You will get the full mark if you can complete the exercise and demonstrate it. Different marks will be given depending on the level of completion and demonstration.
Correct answers to questions, demonstrating understanding of the materials learned.
It is a University requirement (http://www.policy.monash.edu/policy-bank/academic/education/conduct/plagiarism-procedures.html) for students to submit an assignment coversheet for each assessment item. Faculty Assignment coversheets can be found at http://www.infotech.monash.edu.au/resources/student/forms/. Please check with your Lecturer on the submission method for your assignment coversheet (e.g. attach a file to the online assignment submission, hand-in a hard copy, or use an online quiz).
Submission must be made by the due date otherwise penalties will be enforced.
You must negotiate any extensions formally with your campus unit leader via the in-semester special consideration process: http://www.infotech.monash.edu.au/resources/student/equity/special-consideration.html.
Monash has educational policies, procedures and guidelines, which are designed to ensure that staff and students are aware of the University's academic standards, and to provide advice on how they might uphold them.
You can find Monash's Education Policies at:
http://policy.monash.edu.au/policy-bank/academic/education/index.html
Key educational policies include:
The University provides many different kinds of support services for you. Contact your tutor if you need advice and see the range of services available at www.monash.edu.au/students. For Sunway see http://www.monash.edu.my/Student-services, and for South Africa see http://www.monash.ac.za/current/
The Monash University Library provides a range of services and resources that enable you to save time and be more effective in your learning and research. Go to http://www.lib.monash.edu.au or the library tab in my.monash portal for more information. At Sunway, visit the Library and Learning Commons at http://www.lib.monash.edu.my/. At South Africa visit http://www.lib.monash.ac.za/.
Academic support services may be available for students who have a disability or medical condition. Registration with the Disability Liaison Unit is required. Further information is available as follows: